MOSCOW STATE INSTITUTE OF INTERNATIONAL RELATIONS (Ì GIM 0- UNlVERSITY), ÒÍÅ MINISTRY OF FOREIGN AFFAIRS OF RUSSIA Â.À. in Government and International Affairs School of Government and International Affairs Department îÑ Political Theory «Approved» Vice for Educational Development , À. Khudaykulova « 2014 IT and Internet Ñîò munications in Governance ÒÜåcourseprogram developedÜóAgeychev À., 2014 @AgeychevA., 2014 @MGIMO-University,2014 The course “IT and Internet Communications in Governance” is elaborated in accordance with the MGIMO Educational Standard for the Bachelor’s Program in International Affairs (program track “Government and International Affairs”). Authors___________________________________ A. Ageychev and S. Apetyan Director of the MGIMO library______________________ Marina Reshetnikova The program is approved by Department of Political Theory on _____________________________ Head of Department__________________________ Prof. Tatyana Alekseeva, Ph.D. © A. Ageychev and S. Apetyan, 2014 © MGIMO-University, 2014 2 PART 1: INSTRUCTOR INFORMATION, COURSE DESCRIPTION AND TEACHING METHODS • • • • • • 1.1 General information Full course title: IT and Internet Communications in Governance Type of course: Compulsory Level of course: B.A. Year of study: 1st Number of ECTS credits allocated: 1 Name of lecturer(s) and office hours: Anton Ageychev, Department of Political Theory (MGIMO), Fellow Stanislav Apetyan, The Foundation for Civil Society Development, Expert Office hours: Thursday 1PM-4PM, office 3024 E-mail: ageychev@hotmail.com, tezpr@mail.ru 1.2 Course aims and learning outcomes The aims of the course are to provide students with foundational knowledge and understanding of the place and role of Internet communications in the modern world, their influence on socio-cultural and political behavior, to introduce students to basic principles of functioning of the Internet, to provide students with understanding of Internet management, administration and governance principles. Learning outcomes: By the end of this course students should be able to: • know the structure and principles of functioning of the Internet, key actors in the sphere of digital technologies; • acquire knowledge of the essence and structure of information processes in modern societies; • navigate freely in information flows and choose quality content; • be familiar with conducting search, storage, processing and submission of information; • understand the principles of interaction and cooperation of government and business on Internet issues; • be able to analyze modern problems connected with the development of the Internet. 1.3 Course requirements and grading plan Course requirements Students will be required to attend not less than 90% of classes and be prepared for class discussions. Conscientious reading of the assigned materials is compulsory. Grading plan • Class participation – 30% Students are expected to attend all the lectures seminars and participate in class discussions; since the course is highly interactive, it is essential that students attend the seminars having read the materials for that day’s class. • In-class business case presentation and case study – 30%. Students are expected to prepare short review of popular website, start-up or Internet service. The review can be prepared either in “Power Point” format or orally. Case should describe history of a project, include information about its owners, short review of the market sphere where it works and assessments of the student. Business cases will be discussed by students after the presentation. By the end of the discussion students will be 3 divided in two groups, each of which should propose their own ideas and short conception of similar Internet project. The advantages and disadvantages of proposed business models and cases will be thought over together with the lecturer. • In-class practice task – 20% Using computers or laptops each student should find as much information about his/her friend, classmate or any chosen person as possible within 20 minutes. The information can be found using any social networks, search engines, websites or services. When information is found, students should present it to the group in any form. Students can conceal any piece of information found by them that they do not want to be revealed. This task is goaled to instruct students to use Internet as source of information. The task is also aimed at demonstration of losses and gains of the Internet when it comes to privacy. • Written/oral practice – 20%. Students will need to present their own concept/idea/plan of Internet regulation. The concept can describe any level of Internet regulation disputes: international, cross-country actions, national cases, juridical issues, business strategies, non-profit organizations and providers levels. The concept can be prepared as a short essay, plan or orally. Each Internet regulation model will be discussed in class together with the lecturer. 4 PART 2. COURSE CONTENT 2.1 Course content and readings by topic Topic 1. Development of the Internet technologies and their influence on the modern world Lecture 1.1 Current stage of development of the Internet, management of the Internet. Classification and typology of Internet management issues. Summary: History of emergence and development of the Internet. ARPANET. Internet as a military technology. Influence of the Internet technologies on global politics and international relations. “Broad” and “narrow” approaches to management of the Internet. The world summit concerning information society. ICANN and ITU – disputes on control over the Internet. Compulsory readings: • Geist M. Governments and country-code top level domains: a global survey // Internet Governance: A grand collaboration / ed. by D. MacLean. NY: UN ICT Task Force, 2004. URL: http://www.michaelgeist.ca/content/view/91/64/ • Goldsmith J., Wu T. Who Controls The Internet?: Illusions Of A Borderless World [e-book]. New York: Oxford University Press; 2006. Available from: eBook Academic Collection (EBSCOhost). Pp.13-49, pp. 49-65, pp. 65-87. • Gelbstein E., Kurbalija J. Internet Governance: Issues, Actors and Divides. Diplo Foundation, 2005. URL: http://www.diplomacy.edu/IGBook. Pp. 8-62. Further readings: • Lessig L. Code version 2.0. – 2 nd ed. NY: Basic Books, 2006. URL: http://codev2.cc/ (available under a Creative Commons Attribution Noncommercial Sharealike license). Pp. 1-60. Lecture 1.2 Main terms and the concepts connected with the functioning of the Internet and new media. Summary: Internet infrastructure. Telecommunication infrastructure. Management protocol transfer / Internet protocol (TCP/IP). “Root” servers. Suppliers of Internet services. Providers of services of broadband communication. Economic models of the Internet connection. Standards of “world wide web” (WWW). “Cloudy data processing”. Cybersafety. Enciphering. Spam. Compulsory readings: • Gelbstein E., Kurbalija J. Internet Governance: Issues, Actors and Divides. Diplo Foundation, 2005. URL: http://www.diplomacy.edu/IGBook. Pp.33-62, pp.113-119. • Lessig L. Code version 2.0. – 2 nd ed. NY: Basic Books, 2006. URL: http://codev2.cc/ (available under a Creative Commons Attribution Noncommercial Sharealike license). Pp.81-119. • Mueller M. Ruling The Root : Internet Governance And The Taming Of Cyberspace [ebook]. Cambridge, Mass: MIT Press; 2002. Available from: eBook Academic Collection (EBSCOhost). Pp. 114-183. Further readings: • Sassen S. Territory, Authority, Rights: From Medieval To Global Assemblages [e-book]. Princeton, N.J.: Princeton University Press; 2008. Available from: eBook Academic Collection (EBSCOhost). Pp.126-156. Lecture 1.3 Challenges and threats caused by the proliferation of the Internet. Why the Internet needs to be supervised? 5 Summary: Network and informational wars. Information wars by means of the Internet. Internet as “world of headings”. Social networks: dangers, advantages, psychology of users. Internet startups. Venture funds. Business on the Internet. Share of the Internet in world economy. E-money. Seminar 1.3 Main principles of information wars on the Internet. Differences between conventional mass media and web mass media. Is it worth opening business on the Internet? What business opportunities does gives the Internet give? Social networks. Personal behavior online. Compulsory readings: • Lessig L. Code version 2.0. – 2 nd ed. NY: Basic Books, 2006. URL: http://codev2.cc/ (available under a Creative Commons Attribution Noncommercial Sharealike license). Pp. 120-138, pp. 325-334. • Goldsmith J., Wu T. Who Controls The Internet?: Illusions Of A Borderless World [e-book]. New York: Oxford University Press; 2006. Available from: eBook Academic Collection (EBSCOhost). Pp.87-105, pp.147-163. • Benedek W., Bauer V., Kettemann M.C. Internet Governance and the Information Society: Global Perspectives and European Dimensions. Eleven International Publishing, 2008. Pp.931. • Research Handbook on Governance of the Internet / ed. by I. Brown. - Cheltenham; Northampton: Edward Elgar, 2013. Pp.3-71. Further readings: • Mueller M. Ruling The Root : Internet Governance And The Taming Of Cyberspace [ebook]. Cambridge, Mass: MIT Press; 2002. Available from: eBook Academic Collection (EBSCOhost). Pp.186-227. Topic 2. The effective usage of Internet resources and national policies towards Internet content. Lecture 2.1 How to look for and find quality content, use interactive Internet resources and social networks? Summary: What are quality criteria for the websites? The use of search engines. Secret or private life and data security on the web. Plagiarism on the Internet. How do Internet mass media work? Print media vs Internet mass media. Debate about the international legislation for the Internet. Seminar 2.1 The Internet of mass media – opponent to print media? Examples of successful and unsuccessful transitions of print media to online editions. Internet mass media legislation. Compulsory readings: • Mueller M., Kuerbris B., Pagé C. Democratizing global communication? Global civil society and the campaign for communication rights in the information society // International Journal of Communication: online academic journal. 2007. Vol 1. - URL: http://ijoc.org/index.php/ijoc/article/view/13/39. Pp. 267-296. • Zittrain J. The future of the internet and how to stop it. New Haven: Yale University Press, 2008. URL: http://futureoftheinternet.org/download/ (available under a Creative Commons Attribution Noncommercial Sharealike license). Pp.7-127. • Messing S., Westwood S.J. Selective Exposure in the Age of Social Media: Endorsements Trump Partisan Source Affiliation When Selecting News Online // Communication Research. 2013. URL: http://crx.sagepub.com/content/early/2013/01/09/0093650212466406. Internet resources: 6 • Kaarle Nordenstreng The New World Information and Communication Order: An Idea That Refuses to Die http://www.uta.fi/cmt/en/contact/staff/kaarlenordenstreng/publications/MacBride_Legacy_Is tanbul.pdf Lecture 2.2 International policy concerning the maintenance of materials of the Internet. Summary: “The bill of rights on the Internet”. Copyrighting on the Internet. Freedom of expression and the right to look for and to extend information. Control over the content and instruments of this control. Types of materials on the Internet. Digital divide. Filtration of materials by different governments. Cybercrimes. Control over materials by means of search engines. Web 2.0. The international organizations and the institutes regulating the Internet space: ICANN, WSIS, UN, EU, Internet community, ITU, OECD, etc. Seminar 2.2 Who makes decisions in the Internet sphere? Organizations regulating the Internet. Why regulating the Internet? Fight for resources on the Internet. The US as predominant force in cyberspace. Compulsory readings: • Padovani C., Nordenstreng K. From NWICO to WSIS: another world information and communication order? // Global Media and Communication. 2005. Vol. 1, № 3. P. 264-272. • Kleinwächter W. Beyond ICANN Vs ITU?: How WSIS Tries to Enter the New Territory of Internet Governance // Gazette: The International Journal For Communication Studies. 2004. Vol. 66(3–4). P. 233–251. - URL: http://gaz.sagepub.com/content/66/3-4/233. Pp.3153. • Geist M. Governments and country-code top level domains: a global survey // Internet Governance: A grand collaboration / ed. by D. MacLean. NY: UN ICT Task Force, 2004. URL: http://www.michaelgeist.ca/content/view/91/64/. Pp.282-291. Further readings: • Агейчев А.С., «iGovernance. Управление Интернетом: теория и история вопроса». М.: ИПО «У Никитских ворот», 2013. Стр. 36-59, 102-130. • Peake, A. Internet governance and the World Summit on the Information Society (WSIS): A report prepared for the Association for Progressive Communications, 2004. URL: http://www.apc.org/en/pubs/issue/internet-governance-and-world-summit-information-s. Lecture 2.3 Russian experience of Internet governance. Summary: “Black lists” of websites. The problem of taxes on earnings in blogs. Bloggers of the “fourth power”. Participation of Russia in WSIS. Participation of Russia in global dialogue on Internet management. The Internet in Russia. Social networks in Russia. How “Runet” differs from the Internet in other countries. Seminar 2.3 Spam in “Runet”. How Russia participates in WSIS. Position of Russia concerning Internet regulation. Russian government vs bloggers and new media. Compulsory readings: • Zittrain J. The future of the internet and how to stop it. New Haven: Yale University Press, 2008. URL: http://futureoftheinternet.org/download/ (available under a Creative Commons Attribution Noncommercial Sharealike license). Pp.67-127. • Research Handbook on Governance of the Internet / ed. by I. Brown. - Cheltenham; Northampton: Edward Elgar, 2013. Pp.143-198. 7 • Bartell D, Sullivan R. Future of the Internet: Social Networks, Policy Issues, and Learning Tools [e-book]. New York: Nova Science Publishers; 2011. Available from: eBook Academic Collection (EBSCOhost). Pp.1-23. Topic 3. Socio-cultural aspects of Internet proliferation and development. Lecture 3.1 Behavior of the user in cyberspace. Summary: Anonymity and impunity phenomenon on the Internet. Reasons of popularity of social networks and blogs. Dependence of a political situation on activity of bloggers. Why politicians use social networks? Is it necessary to regulate social networks? The legislation on social networks. Balance between private and public interests. Election campaigns on the Internet. Social media impact on business and politics. Seminar 3.1 Why users dare to tell anything on the Internet? Elections under network influence. The state and the Internet – friends or foes? How bloggers influence state policies. The American election campaigns on the Internet. Compulsory readings: • Benkler Y. The wealth of networks: how social production transforms markets and freedom. New Haven: Yale University Press, 2006. URL: http://cyber.law.harvard.edu/wealth_of_networks/Main_Page. (available under a Creative Commons Attribution Noncommercial Sharealike license). Pp. 59-91, pp. 176-273, pp. 91133. • Gelbstein E., Kurbalija J. Internet Governance: Issues, Actors and Divides. Diplo Foundation, 2005. URL: http://www.diplomacy.edu/IGBook. Pp.123-132. • Eltantawy N., Wiest J.B. Social Media in the Egyptian Revolution: Reconsidering Resource Mobilization Theory // International Journal of Communication: online academic journal. 2011. Vol 5. - URL: http://ijoc.org/index.php/ijoc/article/view/1242/597 • Chavez J. #Fail: The Misuse of Social Media in the 2012 US Presidential Campaign, 2012. URL: http://www.tcd.ie/policy-institute/events/DV12_Chavez.php Further readings: • Zittrain J. The future of the internet and how to stop it. New Haven: Yale University Press, 2008. URL: http://futureoftheinternet.org/download/ (available under a Creative Commons Attribution Noncommercial Sharealike license). Pp.127-149. Lecture 3.2 The principles of influence of Internet content and Internet resources on communication and behavior. Summary: Ads on the Internet. New media tradition on the Internet. Safety of children on the Internet. Ads and PR in social networks. Use of social networks by children. Transition of a virtual content to the sphere of the real. The reason of popularity of certain YouTube videos. Interrelation between Internet and traditional mass media content. Internet terrorism. Seminar 3.2 New formats of advertizing on the Internet. User behavior in social networks. Types of cybercrimes. Fight against low-quality content. Compulsory readings: • Price M. Media And Sovereignty: The Global Information Revolution And Its Challenge To State Power [e-book]. Cambridge, Mass: MIT Press; 2002. Available from: eBook Academic Collection (EBSCOhost). Pp. 4-35. • Benkler Y. The wealth of networks: how social production transforms markets and freedom. New Haven: Yale University Press, 2006. URL: http://cyber.law.harvard.edu/wealth_of_networks/Main_Page. (available under a Creative 8 Commons Attribution Noncommercial Sharealike license). Pp. 59-91, pp. 176-273, pp. 91133. • Zittrain J. The future of the internet and how to stop it. New Haven: Yale University Press, 2008. URL: http://futureoftheinternet.org/download/ (available under a Creative Commons Attribution Noncommercial Sharealike license). Pp.200-235. • Political Polarization on Twitter / M.D. Conover et al., Indiana University, Center for Complex Networks and Systems Research, 2011. URL: http://truthy.indiana.edu/site_media/pdfs/conover_icwsm2011_polarization.pdf. 2.2 Essay topics 1. How Internet technologies influence behavior and communication of people? New opportunities and new threats. 2. The Internet democracy or the Internet authoritarianism – why it is necessary to regulate the Internet. 3. Copyright on the Internet. 4. Who regulates the Internet space? 5. Can states elaborate international legislation over the Internet? 6. Where on the Internet the freedom of one begins, and freedom of another comes to an end? 7. The Internet technologies in election campaigns. 8. Digital divide: is Internet the privilege of the rich? 9. Fight for virtual resources. 10. Advertizing as the progress engine on the Internet. Differences of advertizing on websites and in conventional media. 2.3 Final test timing • Autumn semester tests – last week of October. 2.4 Consolidated reading list (in alphabetic order) Compulsory reading list: • Gelbstein E., Kurbalija J. Internet Governance: Issues, Actors and Divides. Diplo Foundation, 2005. URL: http://www.diplomacy.edu/IGBook • Lessig L. Code version 2.0. – 2 nd ed. NY: Basic Books, 2006. URL: http://codev2.cc/ (available under a Creative Commons Attribution Noncommercial Sharealike license). • Research Handbook on Governance of the Internet / ed. by I. Brown. - Cheltenham; Northampton: Edward Elgar, 2013. Further reading list: • Bartell D, Sullivan R. Future of the Internet: Social Networks, Policy Issues, and Learning Tools [e-book]. New York: Nova Science Publishers; 2011. Available from: eBook Academic Collection (EBSCOhost). • Benedek W., Bauer V., Kettemann M.C. Internet Governance and the Information Society: Global Perspectives and European Dimensions. Eleven International Publishing, 2008. • Benkler Y. The wealth of networks: how social production transforms markets and freedom. New Haven: Yale University Press, 2006. URL: http://cyber.law.harvard.edu/wealth_of_networks/Main_Page. (available under a Creative Commons Attribution Noncommercial Sharealike license) 9 • Eltantawy N., Wiest J.B. Social Media in the Egyptian Revolution: Reconsidering Resource Mobilization Theory // International Journal of Communication: online academic journal. 2011. Vol 5. - URL: http://ijoc.org/index.php/ijoc/article/view/1242/597 • Geist M. Governments and country-code top level domains: a global survey // Internet Governance: A grand collaboration / ed. by D. MacLean. NY: UN ICT Task Force, 2004. URL: http://www.michaelgeist.ca/content/view/91/64/ • Goldsmith J., Wu T. Who Controls The Internet?: Illusions Of A Borderless World [e-book]. New York: Oxford University Press; 2006. Available from: eBook Academic Collection (EBSCOhost). • Kleinwächter W. Beyond ICANN Vs ITU?: How WSIS Tries to Enter the New Territory of Internet Governance // Gazette: The International Journal For Communication Studies. 2004. Vol. 66(3–4). P. 233–251. - URL: http://gaz.sagepub.com/content/66/3-4/233 • Messing S., Westwood S.J. Selective Exposure in the Age of Social Media: Endorsements Trump Partisan Source Affiliation When Selecting News Online // Communication Research. 2013. URL: http://crx.sagepub.com/content/early/2013/01/09/0093650212466406 • Mueller M. Ruling The Root : Internet Governance And The Taming Of Cyberspace [e-book]. Cambridge, Mass: MIT Press; 2002. Available from: eBook Academic Collection (EBSCOhost). • Mueller M., Kuerbris B., Pagé C. Democratizing global communication? Global civil society and the campaign for communication rights in the information society // International Journal of Communication: online academic journal. 2007. Vol 1. - URL: http://ijoc.org/index.php/ijoc/article/view/13/39 • Padovani C., Nordenstreng K. From NWICO to WSIS: another world information and communication order? // Global Media and Communication. 2005. Vol. 1, № 3. P. 264-272. • Price M. Media And Sovereignty: The Global Information Revolution And Its Challenge To State Power [e-book]. Cambridge, Mass: MIT Press; 2002. Available from: eBook Academic Collection (EBSCOhost). • Sassen S. Territory, Authority, Rights: From Medieval To Global Assemblages [e-book]. Princeton, N.J.: Princeton University Press; 2008. Available from: eBook Academic Collection (EBSCOhost). • Zittrain J. The future of the internet and how to stop it. New Haven: Yale University Press, 2008. URL: http://futureoftheinternet.org/download/ (available under a Creative Commons Attribution Noncommercial Sharealike license) • Агейчев А.С. iGovernance. Управление Интернетом: теория и история вопроса. М.: ИПО «У Никитских ворот», 2013. Internet resources: • Chavez J. #Fail: The Misuse of Social Media in the 2012 US Presidential Campaign, 2012. URL: http://www.tcd.ie/policy-institute/events/DV12_Chavez.php • Kaarle Nordenstreng The New World Information and Communication Order: An Idea That Refuses to Die http://www.uta.fi/cmt/en/contact/staff/kaarlenordenstreng/publications/MacBride_Legacy_Istan bul.pdf 10 • Peake, A. Internet governance and the World Summit on the Information Society (WSIS): A report prepared for the Association for Progressive Communications, 2004. URL: http://www.apc.org/en/pubs/issue/internet-governance-and-world-summit-information-s • Political Polarization on Twitter / M.D. Conover et al., Indiana University, Center for Complex Networks and Systems Research, 2011. URL: http://truthy.indiana.edu/site_media/pdfs/conover_icwsm2011_polarization.pdf 11 PART 3. FINAL REMARKS • Plagiarism is considered as a severe violation and as an indication of incompetence in the course. Plagiarism is understood as making of one’s text using compilation method for other people’s publications, even connected with own phrases and sentences. Collective performance of individual tasks is also unacceptable. Proved plagiarism an F-mark is given regardless of the fulfillment of all other requirements. • Assignments are to be handed in on the due date. Late submissions will translate into the lowering of the grade by 1/3 of a grade for each day of delay. • Students are asked to keep a copy of all work submitted for evaluation. 12